2021
DOI: 10.1111/1556-4029.14750
|View full text |Cite
|
Sign up to set email alerts
|

Forensic analysis of Twitch video streaming activities on Android

Abstract: Video streaming abuses range from copyright infringement and piracy to child sexual abuse and murder. This paper performs proactive forensics of Twitch video streaming activities on Android devices. We designed our experiments using a methodology based on black-box testing principles and conducted them on Android devices using a forensic framework. The results of our experiments suggest that forensic investigators can extract evidences of streams broadcast, shared, and watched by the user, and associate them w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 48 publications
0
3
0
Order By: Relevance
“…12 Mobile forensics a type of digital forensics, is a field that is still under development, and due to the varying nature of smartphone operating systems, extracting useful data as evidence proves to be a challenge. 13 Existing research in the field of forensics focuses mainly on analyzing log files, recovering data from memory, 14,15 databases, 16,17 file-systems, 18 network traffic, 19 etc. During mobile evidence collection, investigators mainly focus on collecting Message (SMS and MMS) data, call records, Location details, images, SIM card details, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…12 Mobile forensics a type of digital forensics, is a field that is still under development, and due to the varying nature of smartphone operating systems, extracting useful data as evidence proves to be a challenge. 13 Existing research in the field of forensics focuses mainly on analyzing log files, recovering data from memory, 14,15 databases, 16,17 file-systems, 18 network traffic, 19 etc. During mobile evidence collection, investigators mainly focus on collecting Message (SMS and MMS) data, call records, Location details, images, SIM card details, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Because Android is the most popular smartphone operating system (OS) (AlZahrani et al, 2021) and Samsung is the most popular hardware for Android OS (Bhat et al, 2019) we have considered Samsung Android phones as the platform for the experiments conducted in the study.…”
Section: Research Design 31 Case Studymentioning
confidence: 99%
“…Anti-forensics aims to prevent, hinder, or corrupt the forensic process of evidence acquisition, its analysis, and/or its admissibility [1,2]. Among many anti-forensic attacks, file wiping is the most common anti-forensic attack in which a file is completely overwritten by some random data [3].…”
Section: Introductionmentioning
confidence: 99%